Flaws were found in the way Firefox executed malformed JavaScript code. Amalicious web page could cause Firefox to crash or allow arbitrary code to be executed as the user running Firefox. (CVE-2007-0775, CVE-2007-0777)

Cross-site scripting (XSS) flaws were found in Firefox. A malicious webpage could display misleading information, allowing a user to unknowinglydivulge sensitive information, such as a password. (CVE-2006-6077, CVE-2007-0995, CVE-2007-0996)

A flaw was found in the way Firefox processed JavaScript contained incertain tags. A malicious web page could cause Firefox to executeJavaScript code with the privileges of the user running Firefox.(CVE-2007-0994)

A flaw was found in the way Firefox cached web pages on the local disk. Amalicious web page may have been able to inject arbitrary HTML into abrowsing session if the user reloaded a targeted site. (CVE-2007-0778)

Certain web content could overlay Firefox user interface elements such asthe hostname and security indicators. A malicious web page could trick auser into thinking they were visiting a different site. (CVE-2007-0779)

Two flaws were found in Firefox's displaying of blocked popup windows. If auser could be convinced to open a blocked popup, it was possible to readarbitrary local files, or conduct a cross-site scripting attack against theuser.(CVE-2007-0780, CVE-2007-0800)

Two buffer overflow flaws were found in the Network Security Services (NSS)code for processing the SSLv2 protocol. Connecting to a malicious secureweb server could cause the execution of arbitrary code as the user runningFirefox. (CVE-2007-0008, CVE-2007-0009)

A flaw was found in the way Firefox handled the "location.hostname" value. A malicious web page could set domain cookies for an arbitrary site, orpossibly perform a cross-site scripting attack. (CVE-2007-0981)

Users of Firefox are advised to upgrade to this erratum package, containingFirefox version 1.5.0.10 which is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/FAQ_58_10188